CVE-2026-31556
Description
In the Linux kernel, the following vulnerability has been resolved:
xfs: scrub: unlock dquot before early return in quota scrub
xchk_quota_item can return early after calling xchk_fblock_process_error. When that helper returns false, the function returned immediately without dropping dq->q_qlock, which can leave the dquot lock held and risk lock leaks or deadlocks in later quota operations.
Fix this by unlocking dq->q_qlock before the early return.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel XFS quota scrubber, a missing unlock before early return can leave a dquot lock held, risking lock leaks or deadlocks.
Vulnerability
Overview
In the Linux kernel's XFS filesystem, the xchk_quota_item function in the scrub subsystem has a missing unlock bug. When xchk_fblock_process_error returns false, the function can return early without dropping dq->q_qlock. This leaves the dquot lock acquired, which can lead to lock leaks or deadlocks in subsequent quota operations.
Exploitation
Context
This is a local vulnerability that can be triggered by a user with sufficient privileges to initiate XFS scrub operations on a filesystem that uses quota. The attacker does not need network access. The bug lies in the error handling path within the quota scrub code. By causing a specific error condition during scrub, the lock can be left held, potentially causing a denial of service due to deadlock or lock contention.
Impact
An attacker could exploit this to cause a deadlock in the kernel, preventing further quota operations and potentially affecting overall system stability. The CVSS v3 base score is 5.5 (Medium), reflecting the local attack vector and the availability impact. There is no evidence of remote exploitation or privilege escalation beyond the immediate denial of service.
Mitigation
The fix, which adds the missing unlock before the early return, has been committed to the Linux kernel stable tree. Users should apply the corresponding stable kernel updates that include this commit. The references [1], [2], [3], [4] point to the fix commits for different stable branches. No workaround other than patching is mentioned.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
9cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 8 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.8.1,<6.12.80
- cpe:2.3:o:linux:linux_kernel:6.8:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.